Behavioral task
behavioral1
Sample
randomjsksksjsd.dll
Resource
win10v2004-20230220-en
General
-
Target
randomjsksksjsd.dll
-
Size
5KB
-
MD5
fc4bb3140f35cc8abd681b63096e7b81
-
SHA1
0946eff5c8cb8bca76dc0702e15076a332929439
-
SHA256
89c3af5318ed0d9de1f320f94152a6730a6a3cbef53593e2a23765da015132d9
-
SHA512
8848e247ece3f51de90c35b93902b46ae4099f611a056b2cf4431f7251296939647f1b964b948a578cba2aa74b4b4123a7a2e05e696e9941eecdb3aebf11be29
-
SSDEEP
24:ev1GSFGFajE/K3tQ3zSaJ2IkM6Pv617s3h/LjpKpuMAmwyhZojsYM:qFGFajFK3zSIe7h/TMXhZogYM
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
Metasploit family
Files
-
randomjsksksjsd.dll.dll windows x86
22647e5b96f2de81d003f25d98d7d2dc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ExitThread
ResumeThread
CreateProcessA
GetThreadContext
SetThreadContext
VirtualAllocEx
WriteProcessMemory
Sections
.text Size: 512B - Virtual size: 338B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ